Quantum Resistant Computing
The Certification Authority Browser Forum, also known as CA/Browser Forum and the National Institute of Standards and Technology (NIST) are urging organizations to prepare NOW for the imminent quantum cryptographic break.
RSA and ECC (Elliptic-Curve-Cryptography) are used for 99% of public key encryption and these are only computationally secure. A breakthrough in quantum computing may be sooner than we think which would render RSA and ECC useless.
SafeCipher is heavily involved in quantum resistant cryptography and will advise you on how best to start your quantum resistant roadmap.
We have been working on algorithm agility, hybrid PKI solutions, HSM quantum-resistant ciphers, encryption and key-exchange quantum resistant algorithms, crypto-agility and much more.
It’s hard to prepare for Post Quantum (PQ) when no one is sure what algorithms will be standardised or when it will be instituted.
SafeCipher is monitoring the NIST standardization project and will be well placed to offer migration strategies as soon as quantum resistant algorithms are ratified. Organisations need to start thinking about Post Quantum Computing because migrating to PQ will be difficult.
One of the key reasons to start thinking about PQ early is to see how algorithms with different size, performance and characteristics perform in your organisation. When you start testing new algorithms, you can determine what breaks when PQ is introduced into your organisation
You need to fully understand your cryptographic estate, which includes getting a complete audit of all your certificates and keys. There will likely be multiple algorithms in use that will react differently when new algorithms are applied.
Contact SafeCipher for help